Sciweavers

848 search results - page 153 / 170
» Understanding Obfuscated Code
Sort
View
GECCO
2009
Springer
132views Optimization» more  GECCO 2009»
14 years 2 months ago
Bringing evolutionary computation to industrial applications with guide
Evolutionary Computation is an exciting research field with the power to assist researchers in the task of solving hard optimization problems (i.e., problems where the exploitabl...
Luís Da Costa, Marc Schoenauer
ICST
2008
IEEE
14 years 2 months ago
Model-Based Testing of Automotive Systems
In recent years the development of automotive embedded devices has changed from an electrical and mechanical engineering discipline to a combination of software and electrical/mec...
Eckard Bringmann, Andreas Krämer
CGO
2007
IEEE
14 years 2 months ago
Ubiquitous Memory Introspection
Modern memory systems play a critical role in the performance of applications, but a detailed understanding of the application behavior in the memory system is not trivial to atta...
Qin Zhao, Rodric M. Rabbah, Saman P. Amarasinghe, ...
ICEBE
2007
IEEE
174views Business» more  ICEBE 2007»
14 years 1 months ago
Worksheet-Driven UMM Modeling of B2B Services
In the development process of a B2B system it is crucial that the business experts are able to express and evaluate agreements and commitments between the partners and that the so...
Christian Huemer, Marco Zapletal, Philipp Liegl, R...
KBSE
2007
IEEE
14 years 1 months ago
Context-aware statistical debugging: from bug predictors to faulty control flow paths
Effective bug localization is important for realizing automated debugging. One attractive approach is to apply statistical techniques on a collection of evaluation profiles of pr...
Lingxiao Jiang, Zhendong Su